A system and method that may include placing a first telephone call from a data network to a target phone number using a trusted carrier; recording the first telephone call in a reference audio data file; placing a second telephone call from the data network to the target phone number using a suspect carrier; recording the second telephone call in a test audio data file; and comparing the test audio data file to the reference audio data file.
|
13. A method comprising:
placing a first telephone call from a data network to a target phone number using a trusted carrier;
recording the first telephone call in a reference audio data file;
placing a second telephone call from the data network to the target phone number using a suspect carrier;
recording the second telephone call in a test audio data file; and
comparing the test audio data file to the reference audio data file.
1. A method comprising:
placing a first telephone call to a target phone number using a trusted carrier;
creating a record of the first telephone call, the record being a reference record;
placing a second telephone call to the target phone number using a test carrier;
creating a record of the second telephone call, the second communication session record being a test record; and
comparing the test record with the reference record.
7. A telecommunications system, comprising:
a data network for bridging telephone calls from a first pstn (Public Switched telephone network) to a second pstn;
a mediation system in communication with the data network for detecting suspected False Answer Supervision (fas) activity at a target telephone number by a first carrier within the second pstn, the first carrier being a suspect carrier;
a gateway in communication with the data network and the second pstn for:
routing a first telephone call to the target telephone number using a trusted carrier; and
routing a second telephone call to the target telephone number using the suspect carrier; and
an fas verification system (FVS) for:
recording the first telephone call using the trusted carrier in a reference audio file; and
recording the second telephone call using the suspect carrier in a test audio file.
2. The method of
establishing a warning threshold for an extent of disparity between the test record and reference record.
3. The method of
identifying the test carrier as safe only if the extent of disparity between the test record and reference record is below the warning threshold.
4. The method of
flagging the test carrier as malicious only if the extent of disparity between the test record and the reference record is equal to or greater than the warning threshold.
5. The method of
6. The method of
8. The system of
an audio comparison analyzer for comparing the test audio file to the reference audio file.
9. The system of
11. The system of
an RTP scanner for storing RTP packets from the first and second telephone calls.
12. The system of
an RTP-to-WAVE converter for converting the RTP packets into WAVE files.
14. The method of
determining a degree of similarity of the test audio file to the reference audio file.
15. The method of
flagging the suspect carrier as malicious only if the degree of similarity is below a predetermined reliability threshold.
16. The method of
17. The method of
message duration; pitch; a length of delay before a voice or other sound begins; sound volume; and an “identity” of a producer of any voice data obtained.
|
The problem of False Answer Supervision (FAS) has plagued the telecommunications industry for years. FAS generally refers to the fraudulent handling of phone calls within one of the PSTN (Public Switched Telephone Network) branches of a phone call made over a PSTN-VOIP-PSTN network, and at that, typically within the recipient PSTN branch of the call path. The fraudulent conduct may include deliberately billing for a period of time in excess of the actual call duration, billing for calls not normally eligible for billing such as calls in which the intended recipient is outside of a service area and calls that are directed to voice mail. Other fraudulent acts include having an FAS service reroute customer traffic to an IVR (Interactive Voice Response system) or send back a false ring back tone and charge customers high-cost destinations and thereby make a huge profit in the process.
To date, approaches for detecting FAS have been based on the use of CDR (Call Data Records) alone. When call durations go down on average, and completion ratios increase, this means a lot of calls are being completed for a very short duration. This, in turn, indicates callers are being routed to an IVR, which answers essentially every call, but callers are also hanging up quickly after realizing they have not reached the party they intended to call.
Using CDR by itself is not particularly effective, and can lead to false positive detections (that is, incorrect determinations that carriers are practicing FAS). Accordingly, there is a need in the art for improved systems and methods for detecting and responding to FAS activity by carriers.
According to one aspect, the invention is directed to a method that may include placing a first telephone call from a data network to a target phone number using a trusted carrier; recording the first telephone call in a reference audio data file; placing a second telephone call from the data network to the target phone number using a suspect carrier; recording the second telephone call in a test audio data file; and comparing the test audio data file to the reference audio data file.
Other aspects, features, advantages, etc. will become apparent to one skilled in the art when the description of the preferred embodiments of the invention herein is taken in conjunction with the accompanying drawings.
For the purposes of illustrating the various aspects of the invention, there are shown in the drawings forms that are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown.
In the following description, for purposes of explanation, specific numbers, materials and configurations are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one having ordinary skill in the art that the invention can be practiced without these specific details. In some instances, well-known features can be omitted or simplified so as not to obscure the present invention. Furthermore, reference in the specification to phrases such as “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of phrases such as “in one embodiment” or “in an embodiment” in various places in the specification do not necessarily all refer to the same embodiment.
In one embodiment, mediation system 200 may form an initial determination that a carrier is suspicious (i.e. engaging in false answer supervision), and then transmit an identification (ID) of the suspected carrier to FVS 300 to test the suspected carrier to determine with greater certainty whether the suspected carrier is in fact operating in a fraudulent manner. This process is discussed in greater detail in connection with
At step 602, the method preferably identifies a target telephone number for use in comparing the operation of a suspect carrier 420 with the operation of a trusted carrier 410. At step 604, the method places a call to the target telephone number using trusted carrier 410. At step 606, the results of the phone call using trusted carrier 410 are preferably recorded. The audio data may be initially captured using the RTP format, and may then be later converted into the WAVE (Waveform Audio File Format) format for data comparison purposes. An audio data file may be created to stored the audio information in either RTP or WAVE format. The data file produced from the audio data obtained in step 606 may be referred to herein as a reference record.
At step 608, the method preferably places a telephone call to the target telephone number using the suspect carrier (the carrier being tested) 420. At step 610, the method preferably records the audio information arising from the call to the target telephone number using the suspect carrier 420. The recorded data obtained in steps 606 and 610 may be converted into any suitable format that is convenient for conduct a comparison of the two recordings, such as, but not limited to, the WAVE format. The data file produced from the audio data obtained in step 610 may be referred to herein as a test record.
At step 612, the audio files obtained in steps 606 and 610, respectively, are preferably compared (614). If the similarity of the two files meets or exceeds a reliability threshold, which may be set at 40% of the audio data, the suspect carrier is deemed not to be malicious (616). If the similarity of two files arising from the comparison in step 614 is less than the reliability threshold, the suspect carrier is preferably flagged as being potentially malicious (618). If the status indicated in step 618 is applied to the suspect carrier, the status of the suspect carrier may subsequently be investigated further using a combination of the comparison results from step 614 and data from the CDR (call data records). The present invention is not limited to employing a reliability threshold of 40%. Reliability threshold levels above or below 40% may be employed.
The results of the comparison conducted in step 614 may alternatively be expressed as including a degree of disparity between the reference audio file obtained using the trusted carrier and the test audio file obtained from the suspect carrier. When using this alternative approach, when the degree of disparity between the two audio files meets or exceeds a “warning threshold,” the suspect carrier is flagged as being potentially malicious. In other embodiments, instead of generating a “malicious or non-malicious” conclusion from step 614, different levels of suspicion of the suspect carrier may be established as a function of the extent of the disparity between the two data files.
When comparing audio data files in step 614, one or more different audio attributes may be used for the comparison. These attributes may include but are not limited to: message duration; pitch of an audio message or ring tone; length of delay before a voice or other sound begins; volume (i.e. amplitude) of the sound in the recording; “identity” of any voice data obtained (i.e. this could include distinctions between the voices of separate persons, between the voice of a person and that of a machine, or between two separate machine-generated voices).
It is also contemplated that the same procedure above may be repeated, so that three or more, for example, comparisons are made prior to making a determination that a fraud is occurring.
At step 708, FVS 300 preferably places a telephone call to the target telephone number using a trusted carrier 410. Thereafter, FVS 300 preferably captures (710) RTP audio data capture of the telephone call. At step 712, FVS 300 converts the RTP data into WAVE data to create a reference audio data file. The audio data file may include, but is not limited to, voice data.
At step 714, FVS 300 places a call to the same target telephone number using the suspect carrier 420. If needed, the target telephone number may be dialed repeatedly until a connection is established. RTP data capture (716) may then be conducted. The RTP data may then be converted (718) WAVE data to generate a test audio data file.
At step 720, FVS 300 compares the reference audio data file to the test audio data file. If the degree of similarity meets or exceeds the reliability threshold (722) the suspect carrier 420 is deemed not be malicious. The reliability threshold may, for instance, be set to 40%. However, the reliability threshold may be set to be above or below the 40% level.
If the similarity level is below 40% (722) after the comparison, the FVS 300 flags the suspect carrier 420 as being possibly malicious and preferably directs the above-described comparison to be repeated with one, two, or more than two additional target telephone numbers to either verify or refute the result of the first comparison.
At step 726, after one or more comparisons corroborate the status of carrier 420 as suspicious, the FVS 300 preferably sends the voice sample files to the Network Operations Center (NOC) for further evaluation.
Combination of FAS and CDR
In one embodiment, the above-described system and method can be productively combined with CDR-based methods for optimizing the detection of FAS call handling. Analysis of call data records may be employed to generate a list of telephone numbers, and the carriers used to service that list of telephone numbers, that appear to have been fraudulently tampered with. Thereafter, the FAS verification system can compare the audio files of calls to the telephone numbers on the list made using trusted carriers with audio files obtained using suspect carriers, as described above, to determine which carriers are in fact behaving fraudulently.
In an embodiment, RAM 806 and/or ROM 808 can hold user data, system data, and/or programs. I/O adapter 810 can connect to storage device 812, which may be a hard drive, a compact disk device, a USB or a Pen Drive, a Removable disk or other mass storage device available within computing system 800. Communications adapter 822 can couple computing system 800 to a local, wide-area, or global network 824. User interface adapter 816 can couple user input devices, such as keyboard 826, scanner 828 and/or pointing device 814, to computing system 800. Moreover, display adapter 818 can be driven by CPU 802 to control the display on display device 820. CPU 802 can be any general or any special purpose CPU.
It is noted that the methods and apparatus described thus far and/or described later in this document can be achieved utilizing any of the known technologies, such as standard digital circuitry, analog circuitry, any of the known processors that are operable to execute software and/or firmware programs, programmable digital devices or systems, programmable array logic devices, or any combination of the above. One or more embodiments of the invention can also be embodied in a software program for storage in a suitable storage medium and execution by a processing unit.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications can be made to the illustrative embodiments and that other arrangements can be devised without departing from the spirit and scope of the present invention as defined by the appended claims.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
4910760, | Dec 23 1988 | Verizon Patent and Licensing Inc | Network verification evaluation testing system |
5369680, | Mar 09 1993 | Illinois Bell Telephone Company | Pro-active billing and routing test set |
5712753, | May 06 1996 | Winbond Electronics Corp. | Method for preventing electrostatic discharge failure in an integrated circuit package |
5712908, | May 17 1996 | Unisys Corporation | Apparatus and method for generating call duration billing records utilizing ISUP messages in the CCS/SS7 telecommunications network |
7388948, | May 25 2004 | SBC KNOWLEDGE VENTURES, L P | AMA access over local audit analysis (AAOLA) |
7424103, | Aug 25 2004 | Viavi Solutions Inc | Method of telecommunications call record correlation providing a basis for quantitative analysis of telecommunications call traffic routing |
7570750, | May 25 2004 | AT&T Intellectual Property I, L.P. | AMA access over local audit analysis (AAOLA) |
20120224675, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 03 2010 | ITXC IP Holdings S.a.r.l. | (assignment on the face of the patent) | / | |||
Feb 15 2011 | TAI, ALAN | ITXC IP HOLDINGS S A R L | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 025818 | /0313 | |
Feb 15 2011 | DOWD, BRIAN | ITXC IP HOLDINGS S A R L | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 025818 | /0313 |
Date | Maintenance Fee Events |
Jun 01 2016 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jul 21 2020 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jul 22 2024 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jan 22 2016 | 4 years fee payment window open |
Jul 22 2016 | 6 months grace period start (w surcharge) |
Jan 22 2017 | patent expiry (for year 4) |
Jan 22 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 22 2020 | 8 years fee payment window open |
Jul 22 2020 | 6 months grace period start (w surcharge) |
Jan 22 2021 | patent expiry (for year 8) |
Jan 22 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 22 2024 | 12 years fee payment window open |
Jul 22 2024 | 6 months grace period start (w surcharge) |
Jan 22 2025 | patent expiry (for year 12) |
Jan 22 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |